"Sorry, you can't use password 'xyz' because it's already being used by user 'abc'"
aha!

So are you storing the actual password in the database or are you storing some hash (perhaps a salted hash)? For security's sake, it's much safer to store a one-way hash of the data that you compare against when they enter their password.
For now I am storing actual passwords. I was thinking of using md5 encryption, and I still plan to, but will leave that until another day. I have a general idea how to do it, just got to do some googling to learn the specifics, then I can implement it.
EDIT:// looking over some stuff in the google results, it seems that it's very easy to do md5 hashing, and not all that much harder to add a static salt, or even better, a dynamic salt. (you could use their email address as the salt

)
<?php
$salt = $userid;
$password = md5($salt.md5($password.$salt));
?>
Just have to implement that in the right spots.
EDIT2:// All the passwords are now hashed before being stored, with the salt being your email address.
I spent 15 minutes trying to figure out why md5 was generating different key's between my login and my register files (so registering would write one key to the database, then login would make a different key and you wouldn't be able to login) then I realised in the register file, it was trying to read the email from the database, which hadn't yet been written to.
